in the oceans of sensitive information growing network threats „one-to-one” utimate security of information